Skip to content
Latest:
  • How to Activate Microsoft Multi Factor Authentication/ User Guide
  • Transfer Files Between user accounts in Windows 10
  • How To Switch Users (accounts) In Windows 10
  • How To Add Signature To An Email Address.
  • Every Thing You Need To Know About Google Chromecast and why should you care?

Tech In A Small Planet

  • Home
  • CCNA Exam
  • Google
  • Microsoft
  • MIKROTIK.
  • APPLE
  • Cisco
  • Wireless
  • Blog Tips

Network Security

How To Network Security Network Tools 

How To Switch Users (accounts) In Windows 10

November 19, 2020November 19, 2020 FairTech 0 Comments

To switch account, Select the Start  button on the taskbar. Then, on the left side of the Start menu, select the account name icon (or picture) > Switch user > a different user.

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
How To Network Security Network Tools 

Simple And Easy Way To Clean Your Laptop Keyboard.

November 13, 2020November 13, 2020 FairTech 0 Comments

From all indicators, We can boldly tell that a computer \ laptop could be carrying dozens of dirty particles than

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
MIKROTIK Router MIKROTIK. Network Security 

Mikrotik Router Safe Mode Features and Config Fully Explained

July 16, 2020July 16, 2020 FairTech 4 Comments

Hello everyone in this tutorial am going to show you how to use mikrotik safe mode feature to manage your

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
How To Network Security Network Tools 

How To Manage A workstation: Computer Management

July 7, 2020July 8, 2020 FairTech 0 Comments

Here in this tutorial, am going to show you how to manage a computer using inbuilt computer management features. first

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Microsoft Network Security 

General changes & improvements On Windows 10 Insider Preview Build 20150

June 24, 2020June 24, 2020 FairTech 0 Comments

General changes & improvements With this week’s build, Microsoft will commence a roll out the new search box on the

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools 

IT, ADS: Importance Of Having Windows Domain Controller

May 26, 2020May 26, 2020 FairTech 0 Comments

More often, now and then, we see most organizations who come to an understanding that it is better to eliminate

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
How To Network Security Network Tools 

IT, ADS : How To Easily Join A computer To A Domain, Windows 7&10.

May 26, 2020May 26, 2020 FairTech 0 Comments

As an IT specialist, one of the control measures you can take to protect your network is by simply adding

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
CCNA Exam Cisco Network Security 

IMPORTANCE OF WILDCARDMASK IN ACCESS CONTROL LIST

July 5, 2019July 5, 2019 FairTech 0 Comments

 In Access Control Lists (ACL), Wildcard masks are used to identify (or filter) an individual host, a network, or a

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools Software 

What To Do If Your Pc Date & Time keeps Resetting Every Time You Reboot You Computer…

November 30, 2018 FairTech 0 Comments

I faced this challenge for over  two weeks or more  in my organization and I personally think it will be

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
MIKROTIK Router MIKROTIK. Network Security 

7 Ways Of Securing A MikroTik Router

August 15, 2018 Kelly Collins 0 Comments

As a network administrator, the first thing you must do is to Secure the Mikrotik  Router under your custody, by

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools 

Trusted And Untrusted Source.

May 31, 2018February 27, 2019 Kelly Collins 1 Comment

We all look forward to use big devices and gadgets, Some are already using these devices even years back before

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools TechTips 

The Last Time I turned Of my Laptop Was Four Years Ago.

May 31, 2018February 27, 2019 Kelly Collins 2 Comments

I know it’s not really a big deal because so many servers have being for Tens of years, some are

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security 

Windows Security Policy.

May 28, 2018February 27, 2019 Kelly Collins 0 Comments

In window security policy, we will say that: If a system tries to connect to you existing network whether an

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security 

How Does Zombies And Botnets Impose Threats To Your Network.

May 28, 2018 Kelly Collins 0 Comments

A distributed denial attack is a type of attack that uses multiple device on disparate network to lunch the coordinated

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security 

McAfee Antivirus Offers Total Security For Every Device You Own.

May 27, 2018 Kelly Collins 0 Comments

Everyone want to know how to completely get rid of online threats. Sometimes Lost of data may be caused by

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools 

Raid Fast Data Recovery Technology.

May 24, 2018 Kelly Collins 0 Comments

For those of us in the telecom and data industry, we all believe that data is life and should be

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
Network Security Network Tools 

Implementing a Virtual Data Room.

May 24, 2018 Kelly Collins 0 Comments

Once a company makes the decision to invest in a VDR, it may be overwhelming deciding which solution will not

Share this:

  • WhatsApp
  • Print
  • Tweet
  • Share on Tumblr
  • Telegram
  • Email
Read more
  • ← Previous

STAY WITH US



Follow


Recent Posts

  • How to Activate Microsoft Multi Factor Authentication/ User Guide
  • Transfer Files Between user accounts in Windows 10
  • How To Switch Users (accounts) In Windows 10
  • How To Add Signature To An Email Address.
  • Every Thing You Need To Know About Google Chromecast and why should you care?

Categories

Android Tips (56) APPLE (48) Blog Tips (42) CCNA Exam (44) Cisco (77) Cryptocurrency (12) DATA PLAN (13) Games (8) Google (18) How To (40) Microsoft (25) MIKROTIK. (94) MIKROTIK Router (27) Mikrotik SPF Modules (6) Network Security (26) Network Tools (56) Software (18) Switch (5) TechTips (63) Uncategorized (4) Wireless (40)

Recent Comments

  • erotik izle on Mikrotik Router Safe Mode Features and Config Fully Explained
  • купить справку от фтизиатра on Stelcoin Is Bringing Freelancing To Blockchain.
  • sikis izle on Mikrotik Router Safe Mode Features and Config Fully Explained
  • porno on Mikrotik Router Safe Mode Features and Config Fully Explained
  • sikis izle on Mikrotik Router Safe Mode Features and Config Fully Explained

GET PAID DOING WHAT YOU LOVE

  • Career
  • Mikrotik
  • Webex
  • Winbox
  • We are Cisco
Copyright © 2021 Tech In A Small Planet. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.